Уязвимость выполнения произвольного кода в Mozilla Firefox, Thunderbird и SeaMonkey из-за переполнения буфера в функции nsWaveReader::DecodeAudioData
Описание
Переполнение буфера в куче в функции nsWaveReader::DecodeAudioData
в Mozilla Firefox, Thunderbird и SeaMonkey позволяет удалённым злоумышленникам выполнять произвольный код с использованием неназванных методов.
Затронутые версии ПО
- Mozilla Firefox до версии 16.0
- Mozilla Firefox ESR 10.x до версии 10.0.8
- Mozilla Thunderbird до версии 16.0
- Mozilla Thunderbird ESR 10.x до версии 10.0.8
- SeaMonkey до версии 2.13
Тип уязвимости
Удалённое выполнение кода
Ссылки
- Mailing ListThird Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Issue Tracking
- Third Party AdvisoryVDB Entry
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Heap-based buffer overflow in the nsWaveReader::DecodeAudioData functi ...
Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
EPSS
9.3 Critical
CVSS2